jeremywohl / nacl
mirror of djb's "NaCl: Networking and Cryptography library"
☆49Updated 13 years ago
Alternatives and similar repositories for nacl:
Users that are interested in nacl are comparing it to the libraries listed below
- Reference implementations (software)☆85Updated 8 years ago
- A fast secure userspace pseudorandom number generator☆82Updated 10 years ago
- Supersingular Isogeny Diffie-Hellman in Go☆135Updated 5 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Mirror of all PDFs from the IACR's eprint☆46Updated last year
- A memory-hard password hashing function.☆68Updated last year
- Password Hashing Competition Submissions☆71Updated 10 years ago
- axolotl based on libsodium☆22Updated 8 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Updated 7 years ago
- XTP - eXternal Transports Protocol☆33Updated last year
- An implementation of the axolotl ratchet based on libsodium.☆23Updated 2 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 6 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆44Updated 10 years ago
- BLAKE2 AVX2 implementations☆23Updated 5 years ago
- oht is an onion routed (using the Tor network, similar in design to ricochet and onionshare) distributed hash table to be used as the bas…☆45Updated 6 years ago
- Python bindings to the Crypto++ library☆48Updated last year
- Work-in-progress Dissent port/rewrite for low-latency anonymous communication☆11Updated 6 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆99Updated 7 years ago
- A Skein and Threefish software suite for C, Java, and Go☆69Updated 9 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆102Updated 4 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆14Updated 4 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 9 years ago
- Experiments in high-assurance crypto.☆47Updated 2 years ago
- Non-C Implementations of the yescrypt KDF.☆29Updated 6 years ago
- Implementations of a fast Message-Authentication Code☆114Updated 2 years ago
- Authenticated encryption for streams and arbitrary large files using libsodium☆52Updated 4 years ago
- telehash tools library in c☆122Updated 5 years ago